I do not usually write about Cisco. It is not my typical focus, and there is no particular hobby-horse here. But today is one of those days. When a core enterprise networking platform is being actively exploited in the wild, it stops being “just another vendor advisory” and becomes a matter of operational reality. If your…
Tag: Cybersecurity
SIEM Is Dead. Long Live the Unified Security Plane.
From Logs to Context: How Sentinel + Defender Redefine SOC Architecture 🙂 Alright my friend, let me explain this the way I would to you over coffee, not in a marketing deck. What Microsoft is doing with Microsoft Sentinel inside the Defender portal is not just a UI consolidation. It is an operational model shift…
Remote Desktop Client MSI is going away. And this one actually matters.
Hi my dear tech geeks, today we will talk about RDC :)))) (last time?) Microsoft has confirmed that the Remote Desktop Client distributed via MSI will reach end of support on 27 March 2026. After that date there will be no security updates. No bug fixes. No quality improvements. The MSI installer will no longer…
Hardware Accelerated BitLocker. A deeper look into the Windows cryptographic stack
Hey Hey exactly as I promised. at LinkedIn At December 2025 Microsoft has introduced hardware accelerated BitLocker, and once you remove the press release language, what this really represents is a relocation of critical cryptographic workload from the general purpose CPU into a dedicated hardware domain within the processor or SoC. The algorithm remains the…
BYOD through Microsoft Entra Global Secure Access. What actually happens under the hood
When people talk about BYOD, it usually sounds like freedom. Let employees work from their own laptops and phones. Save on hardware. Everyone is happy. In reality, BYOD is always about one uncomfortable question: how do you control access when you do not control the device? This is where Microsoft Entra Global Secure Access comes…
Microsoft Sentinel — What’s New in January 2026
Oh well, hello there, folks… After a long Christmas break — the kind where even your SOC starts snoring softly and the alert queue feels blissfully distant — we’re finally back to real life. The coffee is strong again.The analysts are sarcastic again.And AI, naturally, is still trying to behave like an employee with far…
CHAPTER 8/8 THE FINAL BLUEPRINT (2026). The Complete Technical Architecture of a Secure AI Platform
0. Prologue: “An AI platform isn’t a model. It’s an organism.” It has:• blood (data),• an immune system (Purview + ZTA),• a nervous system (identity),• a brain (the LLM),• organs (tools/plugins),• muscles (the execution layer),• skin (the output firewall),• memory (vector stores),• an immune response (Defender + analytics),• a skeleton (governance + policies),• metabolism (pipelines),•…
CHAPTER 7/8 AI Security Engineering & R&D (2026 Edition)
0. Prologue: “AI Security is the one discipline where engineers and cryptographers have suddenly become indispensable again.” The attack landscape of 2026 no longer requires generic DevOps or IT Pros.It demands engineers who actually understand: tokens cryptography sandbox runtime memory layout tool isolation ML pipelines data planes governance layers threat modelling MITRE-AI systems architecture This…
Sysmon Built Into Windows? ’Bout Time, Microsoft – The SOC Boys Will Be Buzzing
Oy, lads and lasses – big Windows news today. Grab your tea, sit down… this one’s a belter. Microsoft’s finally doing the thing we’ve been begging for since the Bronze Age:Sysmon is going native.Yep. Windows 11 and Windows Server 2025 are getting Sysmon baked right in — no downloads, no MSI faffing, no “did you…
Security Copilot: a bit of magic, a lot of engineering, and 10,000 SCU you’ll burn faster than you can say “phishing”
Alright, lads and lasses — hello again, friends.Today we’re diving straight into the delightful chaos otherwise known as Microsoft Security Copilot being bundled into M365 E5. You may have seen the announcement and thought:“Brilliant, free AI for security! What a lovely day.” Calm down, Shakespeare.This isn’t a fairy tale — it’s enterprise security. And as…